Overloaded Wireless MIMO Switching for Information Exchanging through Untrusted Relay in Secure Wireless Communication

A Takahashi, O Takyu, H Fujiwara, T Fujii… - IEICE Transactions on …, 2021 - search.ieice.org
Information exchange through a relay node is attracting attention for applying machine-to-
machine communications. If the node demodulates the received signal in relay processing …

Overloaded wireless MIMO switching for secure wireless communication exchanging to untrusted relay

A Takahashi, F Sasamori, S Handa… - … on Ubiquitous and …, 2019 - ieeexplore.ieee.org
Wireless MIMO Switch makes the information exchange among terminals by two time steps.
As a result, the highly efficiency of information exchanging is achieved. If the relay is …

Wireless MIMO switching with trusted and untrusted relays: Degrees of freedom perspective

F Wang, X Yuan, J Lee… - 2015 IEEE International …, 2015 - ieeexplore.ieee.org
We investigate the degrees of freedom (DoF) and secrecy DoF for a general framework of
multiway relay networks named wireless MIMO switching, where a number of users …

A Novel Secure Transmission Scheme in MIMO Two‐Way Relay Channels with Physical Layer Approach

Q Liu, G Gong, Y Wang, H Li - Mobile Information Systems, 2017 - Wiley Online Library
Security issue has been considered as one of the most pivotal aspects for the fifth‐
generation mobile network (5G) due to the increasing demands of security service as well as …

Secure information sharing with mirroring null steering through untrusted relay with two antennas

T Noguchi, O Takyu, T Fujii, T Ohtsuki… - 2018 IEEE Radio …, 2018 - ieeexplore.ieee.org
This paper proposes the novel secure information sharing among wireless nodes by the
physical layer security based on multi-antenna null steering. For secure wireless …

Enhancing the PHY-layer security of MIMO buffer-aided relay networks

A El Shafie, D Niyato… - IEEE Wireless …, 2016 - ieeexplore.ieee.org
We investigate the physical-layer security of a buffer-aided multiple-input multiple-output
relay channel. The wireless network under investigation is composed of one legitimate …

Encryption over the air: Securing two-way untrusted relaying systems through constellation overlapping

H Xu, L Sun - IEEE Transactions on Wireless Communications, 2018 - ieeexplore.ieee.org
This paper proposes a novel technique called constellation overlapping to secure two-way
untrusted relaying systems. We first consider the symmetric case where two terminal users …

Construction of selection-scheduling of accessing node for high efficiency information exchanging in overloaded wireless MIMO switching

A Takahashi, O Takyu… - … Conference on Information …, 2020 - ieeexplore.ieee.org
Communication using a repeater such as Wireless MIMO Switching is attracting attention
because it enables efficient communication and the network can be easily deployed. In this …

Full-duplex relay assisted secure transmission for NOMA networks

Y Cao, J Tang, N Zhao, Y Chen… - 2019 IEEE/CIC …, 2019 - ieeexplore.ieee.org
In a downlink non-orthogonal multiple access (NOMA) system, the reliable transmission of
cell-edge users cannot be guaranteed. On the other hand, the presence of eavesdroppers …

Secure transmission of wireless relaying systems with jammer and multiple-user selection

Y Yang, J Chen, Y Huang, X Wang, J Liu - IEEE Access, 2017 - ieeexplore.ieee.org
In this paper, we investigate the secure transmission of wireless relaying systems with
multidestinations and an eavesdropper (Eve) in Nakagami-m fading channels. To protect the …